Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
You Can't Always Check What You Wanted: : Selective Checking and Trusted Execution to Prevent False Actuations in Real-Time Internet-of-Things ... Abstract: Modern Internet-of-Things devices are vulnerable to attacks targeting outgoing actuation commands that modify their physical behaviors.
You Can't Always Check What You Wanted: : Selective Checking and Trusted Execution to Prevent False Actuations in Real-Time Internet-of-Things. Monowar Hasan ...
Apr 27, 2023 · In this paper, we propose a framework called Contego-TEE to secure Internet-of-Things (IoT) edge devices with timing requirements from control spoofing attacks where an adversary sends malicious control signals to the actuators.
Apr 27, 2023 · Selective Checking and Trusted Execution to Prevent. False Actuations in Cyber-Physical Systems. Monowar Hasan. School of Electrical Engineering ... checks (i.e., actuation command verification using trusted enclave) are interleaved within real-time tasks. Researchers also proposed anomaly ...
Modern Internet-of-Things devices are vulnerable to attacks targeting outgoing actuation commands that modify their physical behaviors. We present a “selective checking” mechanism that uses game-theoretic modeling to identify the suitable subset of commands to be checked in order to deter an adversary.
A framework called Contego-TEE is proposed to secure Internet-of-Things edge devices with timing requirements from control spoofing attacks where an ... You Can't Always Check What You Wanted: : Selective Checking and Trusted Execution to Prevent False Actuations in Real-Time Internet-of-Things · M. HasanSibin ...
You Can't Always Check What You Wanted: Selective Checking and Trusted Execution to Prevent False Actuations in Cyber-Physical Systems. Preprint. Full-text ... The selective checking and trusted execution (SCATE) framework is implemented on an off-the-shelf ARM platform running standard embedded Linux. We ...
In this paper, we propose a lightweight method for detecting anomalous executions using a distribution of system call frequencies. We use a cluster analysis to learn the legitimate execution contexts of embedded applications and then monitor them at run-time to capture abnormal executions.
May 31, 2024 · M. Hasan and S. Mohan, "You Can't Always Check What You Wanted: Selective Checking and Trusted. Execution to Prevent False Actuations in Real-Time Internet-of-Things," 2023 IEEE 26th International. Symposium on Real-Time Distributed Computing (ISORC), Nashville, TN, USA, 2023, pp. 42-53,.
You Can't Always Check What You Wanted: : Selective Checking and Trusted Execution to Prevent False Actuations in Real-Time Internet-of-Things · Hasan M · Mohan ...